Articles Written by Paul Ferrill

Intel's Galileo Does Homebrew

The Intel Galileo provides a solid framework for testing an embedded device concept for your next Internet of Things project.

Netduino and the .NET Micro Framework

The Netduino board provides the .NET programmer with a way to write code for tiny devices using Visual Studio and familiar languages like C# and VB.Net.

A Quick Look at the Windows 8 Metro Code Samples

Learning by example is a great way to get up to speed on new coding techniques. Microsoft has delivered a ton of examples available for download to help you see concrete illustrations of specific features of the new Metro style apps. Read on to learn more.

Using Python Tools for Visual Studio Part 2

Learn how to use Python Tools for Visual Studio (PTVS) and the Pyvot add-in to create and manipulate Excel data as well as how to generate a histogram using NumPy and SciPy.

Using Python Tools for Visual Studio

Python Tools for Visual Studio (PTVS) brings the power of Visual Studio to any number of Python distributions. This article, the first in a two-part series, is about installing and using Microsoft's Python Tools for Visual Studio.

Building LightSwitch Extensions Part 1

Microsoft Visual Studio LightSwitch version 1.0 is targeted at quickly creating useful line-of-business applications, but it is quite capable of doing much more. The key to rapid development centers around accessing data and presenting it to the user on template-driven screens. Read on to learn more.

Top White Papers and Webcasts

  • This paper introduces IBM Java on the IBM PowerLinux 7R2 server and describes IBM's implementation of the Java platform, which includes IBM's Java Virtual Machine and development toolkit.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds